Identity Management--In Privacy We Trust: Bridging the Trust Gap in eHealth Environments | 8 | 0.52 | 2013 |
Protecting digital identities in future networks | 2 | 0.37 | 2011 |
Identity based architecture for secure communication in future internet | 10 | 0.90 | 2010 |
TRIMS, a privacy-aware trust and reputation model for identity management systems | 20 | 0.98 | 2010 |
A SWIFT Take on Identity Management | 10 | 0.91 | 2009 |
A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing | 15 | 1.13 | 2008 |
Non-Manipulable Aggregator Node Election Protocols For Wireless Sensor Networksac | 30 | 1.21 | 2007 |
TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks | 48 | 2.40 | 2007 |
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation | 106 | 4.13 | 2006 |
A Practical Approach to provide Communication Privacy | 5 | 0.66 | 2006 |
Re-visited: denial of service resilient access control for wireless sensor networks | 4 | 0.45 | 2006 |
Two's company, three is a crowd: a group-admission protocol for WSNs | 0 | 0.34 | 2006 |
Public Key Based Cryptoschemes For Data Concealment In Wireless Sensor Networks | 59 | 2.91 | 2006 |
CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks | 96 | 4.76 | 2005 |
Recognition in a Low-Power Environment | 9 | 0.65 | 2005 |
Secure Comparison of Encrypted Data in Wireless Sensor Networks | 33 | 1.56 | 2005 |
Linking ad hoc charging schemes to AAAC architectures | 2 | 0.38 | 2004 |